Free cookie consent management tool by TermsFeed Policy Generator

Summa Networks Glossary of Terms Index

What is HLR?

Home Location Register (HLR) is the centralized subscriber database for the mobile carriers, which include details of subscribers authorized to use the global mobile communication system (GSM) within the mobile operators realm. This database contains phone number information, authentication information, and data such as phone settings and the subscriber's current location. It is based on SS7 MAP protocol.

What is HSS?

Home Subscriber Server (HSS) is the evolution of the HLR for the 4G networks. Similar to the HLR, the main function of the HSS is to communicate with the network and provide subscriber profile and authentication information. The HSS stores information about subscribers to assist in authorization, device details, as well as user location and service information. It is based on Diameter protocol.

What is VLR?

The Visitor Location Register (VLR) has information about roaming mobile stations in one or more MSC areas. A VLR contains information on all active subscribers in that area, including your home network. Generally, most of the registry entries are not visitors, but users on your own home network.

What is Private LTE Networks?

A private LTE networks could be a local cellular network that has cell sites and core network servers dedicated to supporting the connectivity of a particular organization’s requirements, independent of the cellular networks of service providers. Private LTE networks are important for organizations that use multiple devices and applications. Combined with 4G and 5G technology, they supply a stability of service that outstrips wireless connectivity. Dedicated to and managed by the organization itself, they're designed for high-speed mobility and secure mobile roaming within an organization’s business premises and land.

What is VoLTE?

Voice Over Long Term Evolution (VolTE). This technology helps users to simultaneously send voice and data over the network without losing voice quality. The voice quality is high and the user can keep the data connection on while making a voice call. Other advantage is it allows connecting calls faster.

What is Roaming controls?

Roaming allows a subscriber on one mobile network to access services in another region from a different service provider or operator. The most common example is accessing the services of a provider in another country outside the subscriber's home country.

What is MNO?

A mobile network operator (MNO) is a provider of wireless communications services that has or manages the infrastructure necessary to be able to sell and provide services to end users (subscribers), including the allocation of radio spectrum, the infrastructure of the wireless network. , transportation infrastructure, billing, customer service and provisioning of computer systems, repairs, etc.

What is MVNO?

A mobile virtual network operator (MVNO) is a provider of wireless communications services that does not have the wireless network infrastructure through which it provides services to its customers. An MVNO needs a mobile network operator to gain massive access to network services at wholesale prices, then they can independently set retail prices as well as use their own customer service, billing support systems, marketing and sales staff, or you could use the services of a mobile virtual network enabler (MVNE).

What is MVNE?

A mobile virtual network enabler (MVNE) is a company that supplies the necessary network infrastructure, as well as services, business support, administration, operations support to a mobile virtual network operator (MVNO). MVNE allows MVNO's to offer services to their own clients with their own brands. MVNE does not manage a relationship with consumers, it is a provider of network enablement platforms and services. The MVNE's carry out the planning, implementation and management of mobile services. For example, SIM provisioning and configuration, customer billing, customer relationship management, and value-added service platforms.

What is MVNA?

Mobile Virtual Network Aggregator (MVNA): An MVNA can incorporate many small MVNO's and using the collective power, it can connect to the operator as a single MVNO. The MVNA usually do not have direct subscribers, but if other smaller MVNO that connect to it. In general, you would need to have your own OSS / BSS in order to provide accurate billing information to OMV's.

What is VoWIFI?

Voice over Wifi (VoWifi): Along with IMS technology, it provides a voice packet service over IP in a WiFi network. So it is not necessary to have a mobile signal to make and receive calls. Another advantage is that it enables existing SIM-based security and authentication for VoLTE.

What is VoIP?

Voice over Internet Protocol (VoIP): It is defined as a set of standards for the transmission of multimedia data and voice content using the Internet Protocol (IP). In other words, the voice signal is sent in the form of digital data packets and not in analog form. The use of (VoIP) allows to have low costs, greater functionality, integration with other applications, but it will depend on the bandwidth available on the network.

What is iSIM/eSIM?

The Integrated SIM or iSIM is the next step in the evolution of the SIM card. An iSIM is embedded within a Tamper-resistant element (TRE) on the device’s system-on-a-chip (SoC) and It is the most advanced, efficient, and flexible device-side network equipment. It also eliminates the need to depend on discrete SIM hardware and can be activated wirelessly using an industry-wide secure protocol. The security of the iSIM can be customised as per the requirements of each device.

An iSIM can be useful in providing cellular connectivity to devices with size constraints, such as smartwatches. In addition, the freedom from a physical SIM means an iSIM can be used in a myriad of battery-operated IoT devices, instead of limiting them to Wi-Fi, alleviating any major constraints on the form or shape of the smart device. This is especially beneficial in the era of 5G as more device manufacturers are looking to use low power wide area (LPWA) networks to connect multiple devices in larger and larger inter-communicating networks.

The Embedded SIM card or eSIM is an unremovable embedded sim built into the phone's board. It's rewritable and compatible with all leading carriers. eSIM specifications (data format and security mechanisms in particular) are standardised to allow interoperability and enable remote SIM provisioning of any mobile device. eSIM lets you switch providers with the touch of a button.

eSIMs are found in a wide range of consumer products such as smartphones, wearables, and computers. They are also included in medical IoT devices, home automation, security systems, connected cars, IoT asset tracking devices, handheld POS (Point of Sales) systems, etc.

eSIM brings new advantages to all stakeholders:

  • For the end-user, the onboarding experience is straightforward. The eSIM allows an electronic device to be used as soon as it is switched on.
  • For service providers, logistics and support are simplified: no more SIM cards to manage at the customer's level.
  • For eSIM carriers, eSIM is extending mobile connectivity to many new consumer-connected devices, creating new business opportunities.

What is EIR?

The Equipment Identity Register (EIR) is a network entity used in GSM networks that stores lists of International Mobile Equipment Identity (IMEI) numbers, which correspond to physical handsets (not subscribers). The IMEI is used to identify the actual handset and is not dependent upon the International Mobile Subscriber Identity (IMSI), Mobile Station ISDN Number (MSISDN), or the Subscriber Identity Module (SIM). The IMSI, MSISDN, and SIM are all subscriber-specific and move with the subscriber when purchasing a new handset. The IMEI is handset-specific.

The EIR feature can be used to reduce the number of GSM handset thefts by providing a mechanism that allows network operators to prevent stolen or disallowed handsets from accessing the network. This control is accomplished by comparing the IMEI that is provided during handset registration to the following set of lists provided by the network operator:

  • Black - Mobile Stations (MS) on the Blacklist are denied access to the network.
  • Gray - MSs on the Graylist are allowed on the network, but may be tracked.
  • White - MSs on the Whitelist are allowed access to the network.

What is AAA?

AAA refers to Authentication, Authorization, and Accounting. These three components play a crucial role in ensuring secure access to network services and managing billing and usage information. Choosing a robust and secure AAA solution is key so that broadband operators can deliver reliable network services to consumers.

AAA plays a vital role in telecommunications by ensuring secure user authentication, managing access control, facilitating accounting and billing, enabling seamless roaming, and providing centralised management. It enhances network security, protects resources, and enables efficient utilisation of services while ensuring a smooth user experience.

Authentication: Authentication verifies the identity of users accessing a telecommunications network or service. It typically involves providing credentials such as usernames and passwords. When you log in to your mobile device, home Wi-Fi network, or online service, the authentication process confirms that you are the authorised user and grants you access.

Authorization: Authorization determines the level of access and privileges granted to authenticated users. It defines what services, features, or resources you can access based on your identity and permissions. For example, your authorization level may determine whether you can make international calls, access certain websites, or use specific network services.

Accounting: Accounting involves tracking and recording the usage and consumption of network resources or services. It captures information such as the duration of calls, amount of data used, or types of services accessed. This data is essential for billing purposes, monitoring usage, and generating reports on network usage patterns.

An AAA system provides several benefits to operators. Here are some of the fundamental ones:

User Authentication: by verifying the identity of users, operators can prevent unauthorised access and protect sensitive information and services.

Access Control: AAA systems enable operators to control the level of access granted to different users or user groups. This ensures that users can only access the resources they are authorised to use, based on their role, privileges, or subscription plans. Access control helps maintain network security and prevent misuse of resources.

Service Differentiation: with an AAA, operators can provide differentiated services to their customers based on user profiles and preferences. By classifying users into different groups and applying specific policies and quality of service parameters, operators can offer personalised and tailored services, such as bandwidth allocation, priority access, or specific service packages.

Billing and Accounting: an AAA system plays a crucial role in accounting and billing processes. It tracks and records network resource usage, allowing operators to accurately measure, monitor and bill customers based on their consumption. This is especially important for service providers offering various pricing plans, usage-based billing, or real-time charging.

Roaming and Interoperability: For operators offering roaming services, an AAA enables seamless authentication and authorization of roaming subscribers across different networks. This facilitates interoperability between operators, allowing subscribers to access services when travelling outside their home network.

Scalability and Flexibility: an AAA system is designed to handle a large number of users and transactions, making them highly scalable. They can efficiently manage user databases, session tracking, and policy enforcement even in complex telecommunication environments. Additionally, an AAA is flexible and adaptable, allowing operators to define and update authentication, authorization, and accounting policies as per their evolving business requirements.

Security and Fraud Prevention: an AAA enhances network security by enforcing access control policies, detecting and preventing unauthorised access attempts, and by protecting against fraudulent activities. By monitoring user behaviour and usage patterns, operators can identify and respond to suspicious activities, safeguarding the network and the privacy of their customers.

Overall, an AAA empowers telecommunication operators with robust authentication, access control, accounting, and billing capabilities, enhancing security, service differentiation and customer satisfaction.

Summa Networks´ AAA can be deployed as a stand-alone product to connect to existing HSS, ePDG and PGW. As a 3GPP standard compliant product, it can interwork with any other standard elements. Summa Networks´ AAA is also offered integrated with Summa Networks´ HSS as a single piece of software. This bundling brings a number of advantages for carriers:

  • Both network functions are deployed in the same HW, no need for extra resources or communication links.
  • No need for interoperability testing as products come pre-integrated and pre-tested.
  • Functions are in the same instance so M&S are done over the same SW instance.

Summa Networks´ AAA covers several functional cases:

  • Trusted, untrusted access: non-3GPP connections into your network, from WiFi networks to IoT devices.
  • VoWiFi: Connection from mobile devices connected to WiFi networks to perform calls over WiFi.
  • Entitlement server: Securely connects extra devices from a subscriber (wearable SIM or eSIM devices).

Conclusion

As a telecom operator, choosing the right AAA provider can significantly impact the success of telcos’ business operations. Summa Networks ́ AAA offers several advantages so with our solution, operators rely on dedicated support from Summa Networks ́ experts, helping them stay ahead and competitive in the market.

If you want to learn more about Summa Networks´ AAA, Contact us at Get in Touch, and we will take it further.

What is PCRF?

In today's fast-paced digital world, where connectivity is paramount, the smooth operation of telecommunication networks is vital. Two key components that ensure seamless network performance and optimal user experiences are PCRF (Policy and Charging Rules Function) and PCF (Policy Control Function). Let's delve into their importance and impact on this landscape.

On the one hand, PCRF serves as the cornerstone of policy and charging management. Its primary function lies in establishing and enforcing policies related to network resource allocation, quality of service, and access control. By defining rules and conditions for various services, such as data prioritisation and bandwidth allocation, PCRF empowers service providers to offer tailored experiences to their subscribers. Whether it's ensuring seamless streaming, prioritising mission-critical applications, or maintaining network stability during peak usage, PCRF plays a pivotal role.

On the other hand, PCF handles policy control, enabling service providers to manage network access, security, and data traffic. By integrating PCF with other network elements, policy rules can be enforced at the network edge, ensuring adherence to established guidelines. This facilitates effective traffic management, optimal bandwidth utilisation and improved network security.

PCRF is a critical component in telecommunications networks as it enables QoS control, policy enforcement, charging and billing, service differentiation, and network resource optimization. It helps network operators deliver high-quality services, enforce fair usage policies, and efficiently manage their networks to meet the diverse needs of their customers.

  1. Quality of Service (QoS) Control: PCRF enables network operators to enforce QoS policies and ensures consistent service quality for different applications and services. By prioritising and allocating network resources appropriately, PCRF helps maintain a satisfactory user experience, especially for real-time services like voice and video.
  2. Service Differentiation: With PCRF, service providers can offer differentiated service plans to meet varying customer requirements. By defining and implementing specific policies and rules, PCRF enables service providers to cater for different levels of service, such as premium or basic plans, with varying QoS guarantees, data caps or usage allowances. This flexibility helps attract and retain customers by offering tailored services.
  3. Fair Usage Enforcement: PCRF helps enforce fair usage policies to ensure equitable resource allocation. It prevents network abuse or excessive bandwidth consumption by implementing rules and restrictions on data usage, such as data caps or throttling, based on predefined policies. This ensures that all users have a fair share of network resources and helps maintain overall network performance.
  4. Real-Time Charging and Billing: PCRF plays a crucial role in accurate and real-time charging and billing. It keeps track of service usage, session durations, and other relevant information to calculate charges based on predefined rules. By supporting real-time charging, PCRF enables operators to offer dynamic charging models, provide real-time notifications to customers about their usage and charges, and enhance transparency in billing.
  5. Network Resource Optimization: PCRF optimises network resource utilisation by dynamically managing and allocating resources based on policies and rules. It helps prevent network congestion by applying traffic management techniques and allocating resources based on priority, QoS requirements or service plans. This optimization improves overall network performance, reduces latency and enhances the user experience.

Complex solutions with complicated design rules and clunky web interfaces have been the norm in the PCRF context for years. Summa Networks has implemented a PCRF with a word in mind: SIMPLICITY. We have decided to create a simple yet complete and outstanding PCRF suite of solutions including:

  • Light PCRF for VoLTE, VoWiFi and basic data capabilities
  • Data policy and control functionalities
  • Transparent extension to 5G PCF

Besides, our PCRF can work as a standalone solution or in conjunction with our converged 3G-4G-5G HLR/HSS, UDR/UDM, in a bundled solution which brings benefits from both operational and TCO perspectives.

Finally, our solution can work as a converged policy centre for both 4G and 5G simplifying the transition into standalone 5G networks of the future.

Manage your different bearers from a single policy product!

Summa Networks joint combo PCF+PCRF solution naturally implements policy control requirements in 4G as well as 5G networks. It provides a unified platform for configuring and managing policy decisions based on various network parameters, user subscriptions, and usage to deliver the policies.

The use cases supported are:

  • Seamless session continuity for inter-RAT handover
  • Static as well as dynamic policies
  • Access mobility policy
  • Session management policy
  • IMS integration for VoNR and VoLTE
  • 4G, 5G-NSA, 5G-SA deployments

Would you like to explore further details about Summa Networks´ PCRF & PCF and witness its impact on accelerating network performance, service monetization, and network reliability?

Contact us at Get in Touch and our team of experts will call you back to respond to all your concerns.

What is SDM?

Subscriber data management (SDM) solutions lie at the heart of modern telecommunication networks, consolidating profile data across mobile and fixed networks in a single virtual data store.

Need more information?

Do you have questions with any term or definition? Call us or leave a message. Our team is ready to improve your business.

Yes, go!